Security Aspects of Military Sensor-based Defence Systems

被引:3
|
作者
Johnstone, Michael N. [1 ]
Thompson, Robert [2 ]
机构
[1] Edith Cowan Univ, Secur Res Inst, Perth, WA, Australia
[2] Edith Cowan Univ, Sch Comp & Security Sci, Perth, WA, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
component; Sensor; Network; Vulnerability; Information Systems Security; Multi-agent system;
D O I
10.1109/TrustCom.2013.277
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Australian Defence Force has IMAP and JMAP to perform planning prior to the deployment of forces, but due to the dynamic nature of modern warfare there is a knowledge and security gap for on-ground forces during the execution of an operation. Multi-agent based sensor systems can provide on-ground forces with a significant amount of real-time information that can be used to modify planning due to changed conditions. Future planning will require automated agents planners capable of semi-autonomous generated plans and courses of action. Multi-agent sensor systems will also provide cyber security and management of system performance and human C2 workload. This will become a critical C3 ISTAR capability as multi-agents are faster than humans for path planning and resource allocation in multivariate, dynamic, time-pressured environments. The issue with such sensor systems is the degree to which they are vulnerable to attack by opposing forces. This paper explores the types of attack that could be successful using the IEEE 802.15.4 protocol as an example and proposes defences that could be put in place to circumvent or minimise the effect of an attack.
引用
收藏
页码:302 / 309
页数:8
相关论文
共 50 条
  • [41] Computationally Efficient, Dynamic Distributed Algorithm of Sensor-based Big Data
    Al-kahtani, Mohammed S.
    Karim, Lutful
    Almhana, Jalal
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 759 - 763
  • [42] A Study on Reflecting User Experience for Sensor-based Android IoT Services
    Kim, Bo-Min
    Ahn, Jae-Yoon
    Kim, Hyung-Jong
    2020 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2020), 2020, : 78 - 78
  • [43] Longterm sensor-based monitoring of an LRFD designed steel girder bridge
    Shoukry, Samir N.
    Riad, Mourad Y.
    William, Gergis W.
    ENGINEERING STRUCTURES, 2009, 31 (12) : 2954 - 2965
  • [44] Mini Tractor-mounted Sensor-based Aqua Groundnut Planter
    Anitha, G.
    Kumar, A. Ashok
    Rao, A. Srinivasa
    Rao, Ch Someswara
    AMA-AGRICULTURAL MECHANIZATION IN ASIA AFRICA AND LATIN AMERICA, 2022, 53 (01): : 21 - 26
  • [45] MEMS sensor-based monitoring system for engineered geological disposal facilities
    Yang, Wenbin
    Lunn, Rebecca
    Tarantino, Alessandro
    MINERALOGICAL MAGAZINE, 2015, 79 (06) : 1475 - 1483
  • [46] Application of sensor-based sound control principle in speech recognition technology
    Wang, Xuejun
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [47] A monitoring sensor-based eHealth image system for pressure ulcer prevention
    Chang Soo Sung
    Joo Y. Park
    Multimedia Tools and Applications, 2019, 78 : 5255 - 5267
  • [48] Piezoelectric Sensor-Based Continuous Monitoring of Respiratory Rate During Sleep
    Shuhei So
    Divyanu Jain
    Naohiro Kanayama
    Journal of Medical and Biological Engineering, 2021, 41 : 241 - 250
  • [49] Sensor-based technologies for motion analysis in sports injuries: a scoping review
    Arzehgar, Afrooz
    Seyedhasani, Seyedeh Nahid
    Ahmadi, Fatemeh Baharvand
    Bagheri Baravati, Fatemeh
    Sadeghi Hesar, Alireza
    Kachooei, Amir Reza
    Aalaei, Shokoufeh
    BMC SPORTS SCIENCE MEDICINE AND REHABILITATION, 2025, 17 (01):
  • [50] Delay-Sensitive Services QoS Control in Sensor-Based Mass Applications
    Marinovic, S.
    Rozic, N.
    Cubic, I.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,